no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Are Subsequences of Decimal Digits of PI Random?
|
Suman Kumar Sourabh |
|
2009 |
|
2 |
p. 87-96 |
article |
2 |
Aspects of SOA: An Entry Point for Starters
|
Qusay F. Hassan |
|
2009 |
|
2 |
p. 125-142 |
article |
3 |
Computer applications in clinical psychology
|
Alina Oana Zamoşteanu |
|
2009 |
|
2 |
p. 159-172 |
article |
4 |
Estimators in Cryptography
|
CONSTANTINESCU Nicolae |
|
2009 |
|
2 |
p. 23-30 |
article |
5 |
From "Nolite turbare circulos meos!" to "Don’t delete my folder"
|
Valerian Antohe |
|
2009 |
|
2 |
p. 97-104 |
article |
6 |
How many interchanges does the selection sort make for iid geometric(p) input?
|
SAHANI Debasish |
|
2009 |
|
2 |
p. 67-76 |
article |
7 |
Intelligent Car System
|
Qasim Siddique |
|
2009 |
|
2 |
p. 113-124 |
article |
8 |
Modeling a geometric locus problem with GeoGebra
|
Gabriela-Simona Antohe |
|
2009 |
|
2 |
p. 105-112 |
article |
9 |
On an Ethical Use of Neural Networks: A Case Study on a North Indian Raga
|
SHUKLA Ripunjai Kumar |
|
2009 |
|
2 |
p. 41-56 |
article |
10 |
On the Role of Service Concept in IT
|
DESPI Ioan |
|
2009 |
|
2 |
p. 31-40 |
article |
11 |
Parameterized Complexity on a New Sorting Algorithm: A Study in Simulation
|
KUMAR Prashant |
|
2009 |
|
2 |
p. 9-22 |
article |
12 |
Password Authentication Scheme with Secured Login Interface
|
AKINWALE A. Taofiki |
|
2009 |
|
2 |
p. 77-85 |
article |
13 |
TCP over IEEE 802.11
|
P. Chenna Reddy |
|
2009 |
|
2 |
p. 173-183 |
article |
14 |
Technique detection software for Sparse Matrices
|
KHAN Muhammad Taimoor |
|
2009 |
|
2 |
p. 57-66 |
article |